-
1 cracking a cryptographic protocol
Универсальный англо-русский словарь > cracking a cryptographic protocol
-
2 cracking a cryptographic protocol
<08> 1. взламывание криптографического протокола2. вскрытие криптографического протокола 3. раскрытие криптографического протоколаСборный англо-русский словарь > cracking a cryptographic protocol
См. также в других словарях:
Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… … Wikipedia
Random number generator attack — The security of cryptographic systems depends on some secret data that is known to authorized persons but unknown and unpredictable to others. To achieve this unpredictability, some randomization is typically employed. Modern cryptographic… … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Cypherpunk — Not to be confused with Cyberpunk. A cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups… … Wikipedia
LM hash — Lanman redirects here. For other uses, see Lanman (disambiguation). LM hash, LanMan, or LAN Manager hash was the primary hash that Microsoft LAN Manager and Microsoft Windows versions prior to Windows NT used to store user passwords. Support for… … Wikipedia
Bitcoin — The official Bitcoin client Developer(s) … Wikipedia
Timing attack — In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. The attack exploits the fact that every operation in a computer … Wikipedia
CHAOS (Linux distribution) — infobox OS name = CHAOS caption = CHAOS 1.6 Boot Welcome Screen developer = Midnight Code / Ian Latter family = Linux source model = Open source latest release version = 1.6 latest release date = April 2005] working state = Currentcite web |… … Wikipedia
Internet security — is a branch of computer security[1] specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.[2] The Internet represents an insecure channel for exchanging information leading … Wikipedia
Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… … Wikipedia
GSM — For other uses, see GSM (disambiguation). The GSM logo is used to identify compatible handsets and equipment GSM (Global System for Mobile Communications, originally Groupe Spécial Mobile), is a standard set developed by the European… … Wikipedia